Advertisement

Intimate Partner Violence and the Internet: Perspectives

  • Shelly ClevengerEmail author
  • Mia Gilliam
Living reference work entry

Abstract

Intimate partner violence (IPV) is an issue that many individuals face globally. Cyber IPV is a new frontier in which abusers can access and harm their victims in new ways. Technology has made it possible for a perpetrator of IPV to monitor a victim’s actions online and/or on their mobile device, have instant ability to threaten and harass them, monitor their movements online, as well as stalk them without needing to be in the same physical space. This chapter will provide an overview of the ways in which abusers use technology within an intimate partner relationship to abuse their victims, as well as the prevalence of such acts. A summary of the relevant research will be presented. Finally, current best practices programs and services will be discussed.

Keywords

Cyber IPV Coercion and control Cyberstalking IPV surveillance Spyware Keyloggers Screenloggers Cyberharassment Nonconsensual pornography/revenge pornography Cybersexual exploitation/sextortion 

References

  1. Alexy, E. M., Burgess, A. W., Baker, T., & Smoyak, S. A. (2005). Perceptions of cyberstalking among college students. Brief Treatment and Crisis Intervention, 5(3), 279.CrossRefGoogle Scholar
  2. Alvarez, A. R. (2012). “IH8U”: Confronting cyberbullying and exploring the use of Cybertools in teen dating relationships. Journal of Clinical Psychology, 68(11), 1205–1215.CrossRefGoogle Scholar
  3. Baum, K., Catalano, S., Rand, M., & Rose, K. (2009). Stalking victimization in the United States. Bureau of justice statistics special report, U.S. Department of Justice.Google Scholar
  4. Belknap, J., Chu, A. T., & DePrince, A. P. (2011). The roles of phones and computers in threatening and abusing women victims of male intimate partner abuse. Duke J. Gender L. & Pol'y, 19, 373.Google Scholar
  5. Bocij, P., & McFarlane, L. (2003). Cyberstalking: The technology of hate. The Police Journal, 76, 204–221Google Scholar
  6. Borrajo, E., Gámez-Guadix, M., Pereda, N., & Calvete, E. (2015). The development and validation of the cyber dating abuse questionnaire among young couples. Computers in Human Behavior, 48, 358–365.  https://doi.org/10.1016/j.chb.2015.01.063.CrossRefGoogle Scholar
  7. Brem, M. J., Spiller, L. C., & Vandehey, M. A. (2015). Online mate-retention tactics on Facebook are associated with relationship aggression. Journal of Interpersonal Violence, 30, 2831–2859.  https://doi.org/10.1177/0886260514554286.CrossRefGoogle Scholar
  8. Brem, M. J., Florimbio, A. R., Grigorian, H., Wolford-Clevenger, C., Elmquist, J., Shorey, R. C., Rothman, E. F., Temple, J. R., & Stuart, G. L. (2017). Cyber abuse among men arrested for domestic violence: Cyber monitoring moderates the relationship between alcohol problems and intimate partner violence. Psychology of Violence . Advance online publication.  https://doi.org/10.1037/vio0000130.
  9. Burke, S. C., Wallen, M., Vail-Smith, K., & Knox, D. (2011). Using technology to control intimate partners: An exploratory study of college undergraduates. Computers in Human Behavior, 27(3), 1162–1167.CrossRefGoogle Scholar
  10. Cattaneo, L. B., Cho, S., & Botuck, S. (2011). Describing intimate partner stalking over time: An effort to inform victim-centered service provision. Journal of Interpersonal Violence, 26, 3428–3454.CrossRefGoogle Scholar
  11. Cavezza, C., & McEwan, T. E. (2014). Cyberstalking versus off-line stalking in a forensic sample. Psychology, Crime & Law. (ahead-of-print), 10, 1–16.Google Scholar
  12. Centers for Disease Control and Prevention. (2019). Intimate Partner Violence. https://www.cdc.gov/violenceprevention/intimatepartnerviolence/
  13. Chatterjee R. et al., “The Spyware Used in Intimate Partner Violence,” 2018 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, 2018, pp. 441–458.  https://doi.org/10.1109/SP.2018.00061
  14. Chaudhuri, P., Chatterjee, A., & Verma, V. (2014). Guardians of the Internet. The Telegraph. http://www.telegraphindia.com/1141207/jsp/7days/story_2412.jsp.
  15. Citron, D. K., Franks, M. A., & Criminalizing Revenge Porn. (2014). Wake forest law review, Vol. 49, 2014, p. 345+; U of Maryland Legal Studies Research Paper No. 2014–1. Available at SSRN: https://ssrn.com/abstract=2368946
  16. Clevenger, S. L., Navarro, J. N., & Gilliam, M. (2018). Technology and the endless “cat and mouse” game: A review of the interpersonal cybervictimization literature. Sociology Compass . Online first.  https://doi.org/10.1111/soc4.12639.
  17. Cyber Civil Rights Initiative. (2018). Revenge pornography. https://www.cybercivilrights.org/
  18. DeKeseredy, W. S., & Schwartz, M. D. (2016). Thinking sociologically about image-based sexual abuse: The contribution of male peer support theory. Sexualization, Media, & Society, 2(4). 237462381668469.Google Scholar
  19. DeKeseredy, W. S., Hall-Sanchez, A., Nolan, J., & Schwartz, M. D. (2017). A cam- pus LGBTQ community’s sexual violence and stalking experiences: The contribution of pro-abuse peer support. Journal of Gender-Based Violence, 1, 169–185.CrossRefGoogle Scholar
  20. Dimond, J. P., Fiesler, C., & Bruckman, A. S. (2011). Domestic violence and information communication technologies. Interacting with Computers, 23(5), 413–421.CrossRefGoogle Scholar
  21. Dodge, R. C., Carver, C., & Ferguson, A. J. (2007). Phishing for user security awareness. Computers & Security, 26, 73–80.CrossRefGoogle Scholar
  22. Dreßing, H., Bailer, J., Anders, A., Wagner, H., & Gallas, C. (2014). Cyberstalking in a large sample of social network users: Prevalence, characteristics, and impact upon victims. Cyberpsychology, Behavior and Social Networking, 17(2), 61–67.CrossRefGoogle Scholar
  23. Eaton, A. A., Jacobs, H., & Ruvalcaba, Y. (2017). 2017 nationwide online study of nonconsensual porn victimization and perpetration: A summary report. Florida International University, Department of Psychology: Cyber Civil Rights Initiative, Inc.Google Scholar
  24. FBI. (2019). Cyberstalking stories. “Woman sentenced for stalking woman on social media.” https://www.fbi.gov/news/stories/woman-sentenced-for-cyberstalking
  25. Finn, J. (2004). A survey of online harassment at a university campus. Journal of Interpersonal Violence, 19(4), 468–483.CrossRefGoogle Scholar
  26. Fisher, B. S., Cullen, F. T., & Turner, M. G. (2002). Being pursued: Stalking victimization in a national study of college women. Criminology & Public Policy, 1, 257–308Google Scholar
  27. FlexiSpy. (2018). https://www.flexispy.com
  28. Franks, M. A. (2016). ‘Revenge porn’ reform: A view from the front lines (October 17, 2016). Florida Law Review. University of Miami Legal Studies Research Paper no. 16–43. Available at SSRN: https://ssrn.com/abstract=2853789
  29. Fraser, C., Olsen, E., Lee, K., Southworth, C., & Tucker, S. (2010). The new age of stalking: Technological implications for stalking. Juvenile and Family Court Journal, 61(4), 39–55.CrossRefGoogle Scholar
  30. Freed, D., Palmer, J., Minchala, D., Levy, K., Ristenpart, T., & Dell, N. (2017). Digital technologies and intimate partner violence: A qualitative analysis with multiple stakeholders. PACM: Human-Computer Interaction: Computer-Supported Cooperative Work and Social Computing (CSCW), 1(2). Article 46.Google Scholar
  31. Fremouw, W. J., Westrup, D., & Pennypacker, J. (1997). Stalking on campus: The prevalence and strategies for coping with stalking. Journal of Forensic Sciences, 42(4), 666–669.CrossRefGoogle Scholar
  32. Gámez-Guadix, M., Almendros, C., Borrajo, E., & Calvete, E. (2015). Prevalence and association of sexting and online sexual victimization among Spanish adults. Sexuality Research and Social Policy, 12(2), 145–154.CrossRefGoogle Scholar
  33. Goodson, P., McCormick, D., & Evans, A. (2001). Searching for sexually explicit materials on the Internet: an exploratory study of college students’ behavior and attitudes. Archives of Sexual Behavior, 30, 101–118.Google Scholar
  34. Gregorie, T. M. (2001). Cyberstalking: Dangers on the information superhighway. National Center for Victims of Crime.Google Scholar
  35. Hand, T., Chung, D., & Peters, M. (2009). The use of information and communication technologies to coerce and control in domestic violence and following separation. Sydney: Australian Domestic and Family Violence Clearinghouse, UNSW.Google Scholar
  36. Harrell, E., & Langton, L. (2013). Victims of identity theft, 2012 (NCJ 243779). Washington, DC: Bureau of Justice Statistics.Google Scholar
  37. Hauser, C. (2017). Dani Mathers, former playboy model, gets community service for snapchat of woman in gym. New York Times. https://www.nytimes.com/2017/05/25/us/dani-mathers-body-shaming.html?module=inline
  38. Hauser, C. (2018). $6.4 million judgment in revenge porn case is among largest ever. New York Times. https://www.nytimes.com/2018/04/11/us/revenge-porn-california.html
  39. Hinduja, S., & Patchin, J. (2011). Electronic dating violence: A brief guide for educators and parents. Cyberbullying Research Center. Retrieved March, 1, 2011.Google Scholar
  40. King-Ries, A. (2010). Teens, technology, and cyberstalking: The domestic violence wave of the future. Texas Journal of Women & Law, 20, 131–164.Google Scholar
  41. Kraft, E., & Wang, J. (2010). An exploratory study of the cyberbullying and cyberstalking experiences and factors related to victimization of students at a public liberal arts college. International Journal of Technologies, 1, 74–91.  https://doi.org/10.4018/jte.2010100106
  42. Lamphere, R. D., & Pikciunas, K. T. (2016). Sexting, sextortion, and other internet sexual offenses. In J. N. Navarro, S. Clevenger, & C. D. Marcum (Eds.), The intersection between intimate partner abuse, technology, and cybercrime: Examining the virtual enemy (pp. 141–165). Durham: Carolina University Press.Google Scholar
  43. Langton, L. (2011). Identity theft reported by households, 2005–2010 (NCJ 236245). Washington, DC: Bureau of Justice Statistics.Google Scholar
  44. Lee, R. K. (1998). Romantic and electronic stalking in a college context. William & Mary Journal of Women and the Law, 4(2), 373–409.Google Scholar
  45. Leisring, P. A., & Giumetti, G. W. (2014). Sticks and stones may break my bones, but abusive text messages can also hurt: Development and validation of the cyber psychological abuse (CPA) scale. Partner Abuse, 5, 323–341.  https://doi.org/10.1891/1946-6560.5.3.323.CrossRefGoogle Scholar
  46. Levy, K. E. (2014). Intimate surveillance. Idaho Law Review, 51, 679–696.Google Scholar
  47. Matthews, T., O’Leary, K., Turner, A., Sleeper, M., Woelfer, J. P., Shelton, M., Manthorne, C., Churchill, E. F., & Consolvo, S. (2017). Stories from survivors: Privacy & security practices when coping with intimate partner abuse. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (pp. 2189–2201).Google Scholar
  48. McAfee. (2013). Love, relationships, and technology survey. Retrieved from http://www.mcafee.com/us/about/news/2013/q1/20130204-01.aspx
  49. McGlynn, C., & Rackley, E. (2016). Not “revenge porn,” but abuse: Let’s call it image-based sexual abuse. Inherently Human: Critical Perspectives on Law, Gender & Sexuality, 41. Retrieved from https://inherentlyhuman.wordpress.com/2016/02/15/not-revenge-porn-but-abuse-lets-call-it-image-based-sexual-abuse.
  50. Melander, L. A. (2010). College students’ perceptions of intimate partner cyber harassment. Cyberpsychology, Behavior and Social Networking, 13(3), 263–268.CrossRefGoogle Scholar
  51. mSpy. (2018). https://www.mspy.com
  52. Najdowski, C. J., & Hildebrand, M. M. (2014). The criminalization of “revenge porn”: How psychological research can guide policy. Monitor on Psychology, 45(1), 26.Google Scholar
  53. National Center for Victims of Crime. (2018). Stalking Resource Center. http://victimsofcrime.org/our-programs/stalking-resource-center
  54. National Coalition Against Domestic Violence. (2019). http://www.ncadv.org/
  55. Navarro, J. N. (2016). Cyberabuse and cyberstalking. In J. N. Navarro, S. Clevenger, & C. D. Marcum (Eds.), The intersection between intimate partner abuse, technology, and cybercrime (pp. 125–139). Durham: Carolina Academic Press.Google Scholar
  56. Navarro, J. N., Clevenger, S., & Marcum, C. D. (Eds.). (2016). The intersection between intimate partner abuse, technology, and cybercrime: Examining the virtual enemy. Durham: Carolina Academic Press.Google Scholar
  57. Palanisamy, B., Sensenig, S., Joshi, J., & Constantino, R. (2014). LEAF: A privacy-conscious social network-based intervention tool for IPV survivors. In Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration (IEEE IRI 2014) Information Reuse and Integration (IRI), 2014 IEEE 15th International Conference (pp. 138–146).Google Scholar
  58. Paraben. (2018). Paraben Recovery Sticks. https://www.paraben-sticks.com/index.html
  59. Reyns, B. W., Henson, B., & Fisher, B. S. (2012). Stalking in the twilight zone: Extent of cyberstalking victimization and offending among college students. Deviant Behavior, 33(1), 1–25.CrossRefGoogle Scholar
  60. Rogers, L. E., Castleton, A., & Lloyd, S. A. (1996). Relational control and physical aggression in satisfying marital relationships. In D. D. Cahn & S. A. Lloyd (Eds.), Family violence from a communication perspective (pp. 218–239). Thousand Oaks: Sage.CrossRefGoogle Scholar
  61. Sheridan, L. P., & Grant, T. (2007). Is cyberstalking different? Psychology, Crime & Law, 13(6), 627–640.CrossRefGoogle Scholar
  62. Smith, S. G., Basile, K. C., Gilbert, L. K., Merrick, M. T., Patel, N.,Walling, M., & Jain, A. (2017). The national intimate partner and sexual violence survey (NISVS): 2010–2012 state report.Google Scholar
  63. Southworth, C., Dawson, S., Fraser, C., & Tucker, S. (2005). A high-tech twist on abuse: Technology, intimate partner stalking, and advocacy. St. Paul: Violence Against Women Online Resources.Google Scholar
  64. Southworth, C., Finn, J., Dawson, S., Fraser, C., & Tucker, S. (2007). Intimate partner violence, technology, and stalking. Violence Against Women, 13(8), 842–856.CrossRefGoogle Scholar
  65. Spence-Diehl, E. (2003). Stalking and technology: The double-edged sword. Journal of Technology in Human Services, 22(1), 5–18.CrossRefGoogle Scholar
  66. Spitzberg, B., & Cupach, W. (2001). Paradoxes of pursuit: Toward a relational model of stalking-related phenomena. In J. Davis (Ed.), Stalk- ing, stalkers and their victims: Prevention, intervention, and threat assessment (pp. 97–136). Boca Raton: CRC Press.  https://doi.org/10.1201/9781420041743.ch6.CrossRefGoogle Scholar
  67. Spitzberg, B. H., & Hoobler, G. (2002). Cyberstalking and the technologies of interpersonal terrorism. New Media & Society, 4(1), 71–92.  https://doi.org/10.1177/14614440222226271.CrossRefGoogle Scholar
  68. Stark, E. (2007). Interpersonal violence. Coercive control: How men entrap women in personal life. Oxford University Press.Google Scholar
  69. Temple, J. R., Choi, H. J., Brem, M., Wolford-Clevenger, C., Stuart, G. L., Peskin, M. F., & Elmquist, J. (2016). The temporal association between traditional and cyber dating abuse among adolescents. Journal of Youth and Adolescence, 45, 340–349.  https://doi.org/10.1007/s10964-015-0380-3.CrossRefGoogle Scholar
  70. The National Network to End Domestic Violence. (2018). Project Safety Net. https://nnedv.org/content/safety-net/
  71. Walker, L. E. A. (1984). The battered woman syndrome. New York: Springer.Google Scholar
  72. Woodlock, D. (2016). The abuse of technology in domestic violence and stalking. Violence Against Women, 23(5), 584–602.CrossRefGoogle Scholar
  73. Working to Halt Abuse Online. (2018). https://www.haltabuse.org/
  74. Working to Halt Online Abuse. (2013). Online harassment statistics. Retrieved October 18, 2018, from http://www.haltabuse.org/resources/stats/index.shtml
  75. Zweig, J. M., Dank, M., Yahner, J., & Lachman, P. (2013). The rate of cyber dating abuse among teens and how it relates to other forms of teen dating violence. Journal of Youth and Adolescence, 42(7), 1063–1077.CrossRefGoogle Scholar

Copyright information

© The Author(s), under exclusive licence to Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Illinois State UniversityNormalUSA
  2. 2.Indiana State UniversityBloomingtonUSA

Personalised recommendations